咨询与建议

限定检索结果

文献类型

  • 1,577 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 1,578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 897 篇 工学
    • 774 篇 计算机科学与技术...
    • 531 篇 软件工程
    • 251 篇 信息与通信工程
    • 193 篇 控制科学与工程
    • 131 篇 电气工程
    • 84 篇 网络空间安全
    • 77 篇 生物医学工程(可授...
    • 76 篇 安全科学与工程
    • 64 篇 交通运输工程
    • 62 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 45 篇 动力工程及工程热...
    • 42 篇 仪器科学与技术
    • 42 篇 石油与天然气工程
    • 41 篇 光学工程
  • 304 篇 理学
    • 164 篇 数学
    • 81 篇 生物学
    • 73 篇 统计学(可授理学、...
    • 60 篇 物理学
    • 37 篇 系统科学
    • 33 篇 化学
  • 268 篇 管理学
    • 204 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 84 篇 工商管理
    • 35 篇 公共管理
  • 114 篇 医学
    • 79 篇 临床医学
    • 77 篇 公共卫生与预防医...
    • 63 篇 基础医学(可授医学...
  • 52 篇 法学
    • 49 篇 社会学
  • 39 篇 经济学
    • 39 篇 应用经济学
  • 18 篇 文学
  • 15 篇 教育学
  • 11 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 193 篇 data models
  • 158 篇 accuracy
  • 153 篇 computational mo...
  • 92 篇 training
  • 87 篇 feature extracti...
  • 87 篇 machine learning
  • 77 篇 predictive model...
  • 69 篇 data mining
  • 68 篇 deep learning
  • 64 篇 real-time system...
  • 58 篇 big data
  • 49 篇 adaptation model...
  • 45 篇 security
  • 44 篇 robustness
  • 41 篇 decision making
  • 40 篇 cloud computing
  • 40 篇 convolutional ne...
  • 36 篇 analytical model...
  • 35 篇 neural networks
  • 35 篇 artificial intel...

机构

  • 14 篇 lovely professio...
  • 7 篇 shandong provinc...
  • 7 篇 key laboratory o...
  • 6 篇 college of mecha...
  • 6 篇 institute of aer...
  • 5 篇 lloyd institute ...
  • 5 篇 college of intel...
  • 5 篇 university of ch...
  • 5 篇 national univers...
  • 5 篇 department of co...
  • 5 篇 shandong fundame...
  • 5 篇 national univers...
  • 5 篇 institute of aer...
  • 4 篇 karnataka bangal...
  • 4 篇 school of comput...
  • 4 篇 chitkara univers...
  • 4 篇 new horizon coll...
  • 4 篇 srm institute of...
  • 4 篇 school of softwa...
  • 4 篇 koneru lakshmaia...

作者

  • 7 篇 nijhawan ginni
  • 5 篇 jeanette miriam ...
  • 5 篇 lu xiaobo
  • 5 篇 singh navdeep
  • 4 篇 nicola franco
  • 4 篇 choudhry mani de...
  • 4 篇 akhil karnam
  • 4 篇 zhang rui
  • 4 篇 yu zhang
  • 4 篇 akshya j.
  • 4 篇 lihui wang
  • 4 篇 qu yuben
  • 4 篇 wang lihui
  • 4 篇 li lei
  • 4 篇 dong chao
  • 4 篇 dutt varun
  • 4 篇 puri chetan
  • 3 篇 yuangan wang
  • 3 篇 junqi luo
  • 3 篇 zhang lei

语言

  • 1,249 篇 英文
  • 328 篇 其他
  • 4 篇 中文
检索条件"任意字段=2024 IEEE International Conference on Cognitive Computing and Complex Data"
1578 条 记 录,以下是1021-1030 订阅
排序:
Impact of Online Education Learning During Covid 19 on Children's Academic Performance
Impact of Online Education Learning During Covid 19 on Child...
收藏 引用
computing and data Science (ICCDS), international conference on
作者: Shruti Mishra Shruti Srivastava Vaishnavi Kharote Aman Pushp Rahul Singh Gautam Shailesh Rastogi Symbiosis Institute of Business Management Nagpur Symbiosis International (Deemed) University Pune India
The COVID-19 pandemic has led to a broad trend toward online learning, drastically changing the way kids learn in traditional classroom settings. This study looks on how children's academic performance was affecte... 详细信息
来源: 评论
High-Performance FFT Code Generation via MLIR Linalg Dialect and SIMD Micro-Kernels
High-Performance FFT Code Generation via MLIR Linalg Dialect...
收藏 引用
ieee international conference on Cluster computing
作者: Yifei He Stefano Markidis KTH Royal Institute of Technology Stockholm Sweden
Fast Fourier Transform (FFT) libraries are an indispensable and critical component of any High-Performance computing (HPC) software stack. They are used in many applications, from Partial Differential Equation (PDE) s... 详细信息
来源: 评论
Fededrated Learning: Research, Challenges, and Future Directions
Fededrated Learning: Research, Challenges, and Future Direct...
收藏 引用
computing, Power and Communication Technologies (IC2PCT), ieee international conference on
作者: Kuldeep Singh Kaswan Jagjit Singh Dhatterwal Rishika Yadav Kiran Malik Aanjey Mani Tripathi School of Computing Science and Engineering Galgotias University Greater Noida UP India Artificial Intelligence and Data Science Koneru Lakshmaiah Education Foundation Guntur AP India Department of Computer Science and Engineering Graphic Era Hills University Dehradun Uttarakhand India Department of Computer Science and Engineering MRIEM Rohtak India School of Computing Science and Engineering Galgotias University Greater Noida India
Federated Learning, a disruptive and novel aspect of machine learning, is at the forefront of decentralized, privacy-conscious data processing. This in-depth review study navigates the complex environment of Federated...
来源: 评论
Research on Image Encryption Method Based on complex Analytical Chaotic Map
Research on Image Encryption Method Based on Complex Analyti...
收藏 引用
ieee international conference on Power, Intelligent computing and Systems (ICPICS)
作者: Yanling Sun Yingqi Li Department of Science Shenyang Jianzhu University Shenyang China Computer Science and Engineering Shenyang Jianzhu University Shenyang China
Targeting the security issues associated with digital image transmission across networks, a digital image encryption technique based on Piecewise linear chaotic map (PWLCM) and complex analytical chaotic map (ICON) wa... 详细信息
来源: 评论
Poster: Selection of Optimal Neural Model using Spiking Neural Network for Edge computing*
Poster: Selection of Optimal Neural Model using Spiking Neur...
收藏 引用
international conference on Distributed computing Systems
作者: Sanaullah Kaushik Roy Ulrich Ruckert Thorsten Jungeblut Dep. of Eng. and Math. Industrial IOT University of Applied Sciences and Arts Bielefeld Germany Dep. of Computer Science Cyber Defense and AI Lab Lab North Carolina A&T State University NC USA Dep. of Faculty of Technology Cognitive Interaction Technology Universitat Bielefeld Bielefeld Germany
Spiking Neural Networks (SNNs), are inspired by the biological brain's complicated signaling mechanisms and possess unique characteristics that set them apart from traditional artificial neural networks. This rese... 详细信息
来源: 评论
Cloud Technology Impact on Human Behavior Based on cognitive Theory
Cloud Technology Impact on Human Behavior Based on Cognitive...
收藏 引用
Electrical, Computer and Energy Technologies (ICECET), international conference on
作者: Drajad Wiryawan Basil Rattanto Muhammad Shabir Shaharudin Joni Suhartono Adele Bernadet Lingkan Mailangkay Stefanus Rumangkit School of Information Systems Bina Nusantara University Jakarta Indonesia School of Management Universiti Sains Malaysia Penang Malaysia School of Management Bina Nusantara University Jakarta Indonesia
The relationship between cognitive Theory and Cloud Technology is a learning stage for humans, especially technology users, in various innovations used by users in modeling reasoning to develop human direction toward ... 详细信息
来源: 评论
Backdoor Attacks Optimized through Genetic Algorithm-Driven data Augmentation Combinations in Deep Neural Networks
Backdoor Attacks Optimized through Genetic Algorithm-Driven ...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yilun Lyu Xu Ma Yuan Ma Qufu Normal University Qufu China
Deep neural networks (DNNs) have become increasingly popular across a wide range of applications, but recent research has revealed their vulnerability to backdoor attacks. However, existing backdoor attack methods oft... 详细信息
来源: 评论
Research on Information Security and Privacy Protection Model for Big data
Research on Information Security and Privacy Protection Mode...
收藏 引用
ieee international conference on Civil Aviation Safety and Information Technology (ICCASIT)
作者: Yougang Yao Linling Zou Chengdu Neusoft University Chengdu China
In the era of data flood, information security and privacy protection issues have become increasingly prominent, especially in the field of data integration and sharing and cross-border applications. Traditional encry... 详细信息
来源: 评论
MIND: A Privacy-Preserving Model Inference Framework via End-Cloud Collaboration
MIND: A Privacy-Preserving Model Inference Framework via End...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Siyuan Guan Ziheng Hu Guotao Xu Yao Zhu Bowen Zhao Guangzhou Institute of Technology Xidian University Guangzhou China
Image processing and analysis capabilities have been revolutionized by the rapid advancement of deep learning technologies. Model inference enables powerful image analytics, however, complex neural networks often requ... 详细信息
来源: 评论
Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced CR-NOMA Network
Machine Learning-Based Power Allocation Optimization Algorit...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yu Fu Bingcai Chen Qian Ning Kai Lin College of Computer Science and Technology Dalian University of Technology Dalian China College of Computer Science and Technology Xinjiang Normal University Urumq China College of Electronics and Information Engineering Sichuan University Chengdu China
Hybrid non-orthogonal multiple access (NOMA) is a promising scheme to significantly improve communication performance within a 5G mobile network. In this article, a NOMA network is established in the context of underl... 详细信息
来源: 评论